Reducing Aggregation Bias and Time in Gossiping-based Wireless Sensor Networks
|
|
- Kathryn Lloyd
- 6 years ago
- Views:
Transcription
1 Reducing Aggregation Bias and Time in Gossiping-based Wireless Sensor Networks Zhiliang Chen, Alexander Kuehne, and Anja Klein Communications Engineering Lab, Technische Universität Darmstadt, Germany Abstract Wireless sensor networks are able to perform an aggregation of the data generated by sensors. In networks where no gateway or no central sensor is specified, gossiping algorithms are used such that sensors in the whole network can aggregate messages from all other sensors. In the gossiping algorithm, the bias problem limits the quality of the aggregation results and the lack of message identification results in large aggregation time. In this paper, we reveal the possibility of eliminating or reducing the bias at the sensors by using the concept of the divisible functions that are generally applied in a sensor network and by using the memory of the sensors. Furthermore, we show how the aggregation time can be reduced by using different communication strategies for sensors communicating with their neighbors. Simulation results show the reduction of the aggregation bias at sensors as well as a higher speed of the aggregation in the network. I. INTRODUCTION Wireless sensor networks (WSNs) are application-oriented networks where sensors measure data from the physical world and generate messages for aggregation []. A basic goal of WSNs is to aggregate messages of all sensors and perform functions on them [2], [3]. One way of doing this is to set up a sink or gateway and then build a routing tree rooted at the sink and branched out to all sensors [4]. In routing-based WSNs, sensors receive messages from other sensors, perform computations to all the messages and forward the computation output to other sensors along the route. An alternative solution which eliminates a central sink in the network is to use random gossiping where sensors aggregate the messages based on the communications between sensors and their neighbor sensors [5]. Examples can be found in swarming and consensus applications which have been thoroughly discussed recently [5], [6]. In this paper, we consider the random gossiping algorithm with which sensors are randomly waked up to exchange messages with its neighbor sensor(s). In consensus problems, the goal of random gossiping is to asymptotically approach the average value of the measurements at each sensor [5], [7]. In [8], random gossiping with broadcasting is applied in a WSN with sparse samples at sensors to aggregate the messages of the whole network at each sensor. In this paper, we are focusing on the idea that all sensors are capable of aggregating the messages of the entire network. We base this idea on the applications with a type of functions which have been studied in [2] and are referred to divisible This work was performed within the LOEWE Priority Program Cocoon ( supported by the LOEWE research initiative of the state of Hesse/Germany. functions. Divisible functions can be calculated distributively at the sensors in the network and they include some most common functions we are applying in a WSN, e.g. summation, averaging, max, min, histogram, etc.. Moreover, in [9], the authors argue that the summation function can be applied to calculate any function with appropriate pre-and-post processing. Therefore, the divisible functions can in a more general way calculate any function in WSNs, in a distributed way. A problem in gossiping based communication paradigms is the bias of the aggregation at each sensor. The messages from certain sensors may be aggregated many times more than those from other sensors, as the messages exchanged between sensors in the gossiping algorithm are identity-less and the communication and aggregation are always based on local information, i.e., the information of a sensor and its surrounding neighbor sensors. What is more, in a random topology WSN, certain sensors may be located in a position where messages from other sensors are easily repeatedly aggregated. The bias problem in gossiping also results in a long aggregation (convergence) time and a large number of communications between sensors. In this paper, we propose methods to reduce the bias of the aggregation by using messages that sensors may store in their buffers and to lessen the number of communications that are required to finish the aggregation by introducing limited redundant bits when sensors wake up and communicate with its neighbors. The effect of introducing such redundant bits is also considered. In Section II, we give the network model as well as the notations. In Section III, we shortly discuss the divisible functions and some of their properties. In Section IV, we propose two different ways to reduce the bias of the aggregation and the aggregation time. Section V shows performance results and compares the ideas we propose to the conventional random gossiping approach. Section VI concludes this paper. II. NETWORK MODEL AND NOTATIONS We consider a WSN with N randomly deployed sensors. The set of sensors is denoted by V = {v,v 2, v N }. In this paper, whether there is a connection between two sensors is determined by their distance. Let d ij denote the distance between sensorsv i and v j andlet d c be a distance threshold.if d ij d c, sensors v i andv j are connected,else not. N i denotes the set of neighbor sensors of v i, i.e., the set of sensors having connections to v i. Throughout this paper, we use the term data to indicate the information generated at sensors by measurements. Sensors
2 perform computations to the data they generated and received from other sensors and generate messages which indicate the bit-sequence output from computations, i.e., there may be data from several sensors in one message. The messages will be transmitted and received by sensors. We use the term aggregation of messages to indicate that the computations are performedtothe datain themessages. Thedataisalso referred to parameters of functions in the context of divisible functions. III. DIVISIBLE FUNCTIONS AND BIAS OF THE AGGREGATION In this section, we discuss the divisible functions and the bias of the aggregation in gossiping. It will be shown how the bias of the aggregation can be removed based on the concept of the divisible functions. We denote the data generated at sensor v i by s i. An application in WSNs corresponds to a set F of divisible functions [2]. Each divisible function f l F has l parameters and the functions f, f 2, f 3 form the set F. Let S i,i =,,L denote disjoint non-empty sets whose elements are chosen from the parameter sets S = {s,s 2, s K }, i.e., S i S. Let vector s Si denote the parameters given in S i and vector s denotes all parameters in S. One property of divisible functions is that for the parameter set S and any partition Π(S) = {S,S 2,,S L } of it there exists a function g Π(S) such that f K (s S ) = g Π(S) (f l (s S ),f l2 (s S2 ), f ll (s SL )), () where l i,i =,,L denotes the number of parameters in subset S i,i =,,L. With this property, the divisible functions in WSNs can be calculated in a divide-and-conquer fashion [2]. A B (a) C Fig. : Network examples to illustrate the bias of the aggregation In random gossiping, sensors wake up themselves and are waked-up by neighbor sensors randomly. In examples such as the consensus problem, the identities of the data are not preserved because they cannot be distinguished after applying functions to them. An example illustrating the bias problem is showninfig.a.aftersensoraandsensorbexchangingmessages, both sensors have aggregated messages containing data s A ands B. Afterwards,sensor B mayexchangemessageswith sensor C and both will aggregatemessages containingdatas A, s B and s C. When sensor A and sensor B exchange messages for the second time, sensor A will receive an aggregated message containings A, s B ands C which is furtheraggregated with its own message which already contains {s A,s B }. The aggregation at sensor A will be biased since it is performed to the data multiset {s A,s B,s A,s B,s C }. Another reason which may cause a bias of the aggregation may be loops in the network topology as shown in Fig. b. Even without the same pair of sensors communicating multiple times, a sensor may B A C (b) D aggregate duplicated data due to the richly connected network topology. In [], it is shown that in consensus problems where only the average values is of interest in the whole network, the idea of topology control could be applied to balance the communication cost, e.g. energy consumption and the aggregation time, with bias tolerance. However, bias reduction is not considered in []. In this paper, we use the concept of divisible functions to reduce and even in some cases eliminate the bias. For two sensorsv C andv R,letS C ands R betheirsetsofparametersof functions f lc and f lr, respectively, where f lc and f lr belong to the divisible function set F. We denote s SC and s SR as the parameters in S C and S R, respectively. If S C S R φ, the aggregation f (lc+l R)(s SC,s SR ) = g Π({SC,SR}) (f lc (s SC ),f lr (s SR )) (2) is biased. Define a set Ψ CR = {S,S 2, S ψ } where ψ is the number of parameter sets in Ψ CR. In order to eliminate the bias in (2), sensors v C and v R apply the operation to the parameter set in set Ψ CR, where the operation applies either the unions or the intersections to the sets, such that S B = ψ i= S i = S C S R. (3) It shall be noted that, although sensors v C and v R both have the bias aggregation given in (2), they may have different sets Ψ CR. A toy example to illustrate the operation is given as follows. Assume that sensor v C with the parameter set S C = {s,s 2,s 3 }iscommunicatingwithsensorv R whoseparameter set iss R = {s 3,s 4 }.Thebiasexistsdueto S C S R = {s 3 }.If there isaset Ψ CR = {S,S2,S3}with S = {s }, S 2 = {s 2 } and S 3 = {s,s 2,s 3 }, the operation to get S B is 3 i= S i = (S S 2 ) S 3. For the general case, the operation of getting S B from Ψ CR is given by the pseudo code in Fig. 2. : S output = S ; i = 2; 2: while S output S B do 3: if S i S output = φ then 4: S output = S i S; 5: else 6: if S i S output then 7: S output = S output S i; 8: end if 9: end if : i = i+; : if i > ψ then 2: i = ; 3: end if 4: end while Fig. 2: The operation of We further define S A = S C \S B. The aggregation f lc (s SC ) = g Π({SA,SB}) (f la (s SA ),f lb (s SB )) (4) is followed with a function g Π({SC,SB}) such that f la (s SA ) = g Π({SC,SB}) (f lc (s SC ),f lb (s SB )). (5) The unbiased aggregation of the parameters in S C and S R is therefore achievable by f (la+l R)(s SA,s SR ) = g Π({SA,SR}) (f la (s SA ),f lr (s SR )). (6)
3 We name the set Ψ CR as the bias-elimination set of parameter set S C S R. Instead of proving the general existence of the function g Π({SC,SB}), in this paper, we exemplify g Π({SC,SB}) for several functions mentioned in [2]. ) In application which calculates the mean of the messages, the output f la (s SA ) can be calculated by f la (s SA ) = g Π({SC,SB}) (f lc (s SC ),f lb (s SB )) = l Cf lc (s SC ) l B f lb (s SB ) l C l B, (7) hence the unbiased aggregation f (la+l R)(s SA,s SR ) is f (la+l R)(s SA,s SR ) = l Af la (s SA )+l R f lr (s SR ) l A +l R. (8) 2) When the sum function is to apply to the messages, we simply have and f la (s SA ) = f lc (s SC ) f lb (s SB ), (9) f (la+l R)(s SA,s SR ) = f la (s SA )+f lr (s SR ). () IV. GOSSIPING OF SENSORS WITH INDICATING HEADERS In this section, we propose methods for gossiping based WSNs for bias reduction or elimination and for reducing the aggregation time. For that purpose, we introduce an extra header which will be paired with each message and will be exchanged prior to the transmission of each application message. For a WSN with N sensors, the indicating header of an aggregated message is an N-bit message field and is denoted by I i, where the subscript i indicates the relation to sensor v i. If the current message of sensor v i has aggregated the data generated from the measurement at sensor v j, the j- th bit in I i, I i (j) is marked, otherwise. The indicating header will only represent whether the corresponding data has been aggregated without showing the duplication, therefore, it corresponds to the parameter set S i which is introduced in Section III before (). We define an invertible function Θ which maps the parameter set S i to the indicating header I i, i.e., I i = Θ(S i ) and S i = Θ (I i ). Due to the existence of the biased aggregation, the parameter set S i does not tell how many times the data from a certain sensor has been aggregated, but only which data has been aggregated. In this paper, we assume when two sensors v i and v j are waked up to exchange messages, they first exchange the indicating headers of their messages and decide whether a transmission on a direction, i.e., v j to v i or v i to v j is needed. Sensor v j will only transmit its message to v i if I j and I i indicate that S j S i, i.e., v j has aggregated data that v i has not. After sensor v j sending its message to sensor v i, v i will update its indicating header as I i = Θ(S i S j ) () = Θ ( Θ (I i ) Θ (I j ) ). The same procedure is applied when sensor v i transmits its message to sensor v j. The gossiping algorithm stops in the network when I i (j) = for j = N and i = N. In the following, we discuss two different properties of sensors leading to a reduction of aggregation bias and time. Firstly, we consider that sensors can memorize previously received messages and the concept of the divisible functions discussed in Section III which can be applied to reduce or eliminate the bias. Secondly, we consider that sensors may follow different strategies with which they communicate with their neighbors, which can be used to decrease the aggregation time. ) Bias reduction through memorizing: First, we consider a sensor s ability to memorize the previous received messages. This considers that real sensors have buffers which can store an amount of messages together with their indicating headers. For a finite length buffer, the input-output strategy of the buffer is First-In-First-Out (FIFO). At a certaintime instantt, the newest message in the buffer of sensor v i is the current message whose indicating header is I i. When sensor v i receives a message from sensor v j, it uses the indicating header I i of its own newest message and the indicating header I j of the received message to check the bias of the aggregation,s B = S i S j = Θ (I i ) Θ (I j ). If S B is non-empty, sensor v i uses the messages in its buffer to find the bias-eliminationset Ψ ij of S B. Sensor v i appliesexhausted search method to test all combinations of the messages in its buffer. For a set of parameter sets given by a combination, sensor applies the operation given in Fig. 2. If the operation outputs the bias parameter set S B, the given combination is then a bias-elimination set. If sensor v i cannot find the bias-elimination set Ψ ij, sensor v i will then ignore the bias and perform a biased aggregation. In this case, the biased aggregation will be propagated when sensor v i communicates with other sensors. In order to quantify the bias for measuring the performance after aggregation of messages in the whole WSN, we define r i as an aggregation recorder at sensor v i. r i is a vector with integer elements of length N where the j-th entry in r i indicates how many times parameter s j has been aggregated in the newest message of sensor v i. Therefore, vector r i and the indicating-header I i have the following relation: { if ri (j) > I i (j) = (2) if r i (j) =. We define the matrix R which is a vertical stack of r i,i =,2,,N whenthegossipingalgorithmstopsinthenetwork. The bias of the aggregation in the WSN is denoted by b and is defined as the normalized summation of all elements of the matrix R, i.e., b = N 2 N i= j= N R(i,j). (3) With this definition, when there is no bias, i.e., all entries in R are, the bias is b =. 2) Time reduction through message exchange strategies: Secondly, we consider a sensor s ability to use different strategies of exchanging messages with its neighbors. We apply two communication strategies which are mentioned in [5], [7] when a sensor wakes up. Note that [5], [7] focus on consensus problems to compute the average value in a WSN and do not
4 work on gossiping for general function computations based on message exchanges with indicating headers. In the first strategy, when a sensor v i wakes up, it exchanges messages with one neighbor sensor v j N i. In the second strategy, the awake sensor wakes up all its neighbor sensors in N i and perform time-division based messages exchanges with all of them. We name the first type of sensors the and the latter type of sensors the. The goal of both strategies is to avoid unnecessary communications in order to reduce the total number of communications in the network. When sensor v i wakes up, it triggers all sensors in N i to transmit their indicating-headers to v i. Ifsensorv i isahumblesensor,itchoosesthesensorv l whose indicating header results in a maximum mutual difference in the parameter sets S i and S l, i.e., v l = arg max v j N i I i XOR b I j, (4) where XOR b performsthe bit-elementxor operation and sums all elements in the resulting sequence. If sensor v i is a greedy sensor, we deploy the protocol that sensor v i is firstly a greedy listener such that it receives all messages from sensors in N i in a timedivision mode. Then it switches to a greedy speaker and broadcasts the aggregated messages such that all sensors in N i can update their parameter set by receiving the message from v i. From the point of view of a practical sensor network, it is also important to consider in both strategies how long a sensor has to stay awake before the aggregation finishes in the network because a larger awake time will drain the battery of sensors faster and hence decrease their lifetime. However, this aspect is not considered in this paper and is left for future works. V. PERFORMANCE RESULTS In simulations, we randomly deploy N = 2 and N = 3 sensors in a two-dimensional square area, respectively. The communication range d c of each sensor is defined such that the network remains connected. To do so, we use the concept of connectivity introduced in [] with the Laplacian matrix of the network and its second smallest eigenvalue λ 2 to adjust d c such that λ 2 > which guarantees that no sensor or no group of senors is isolated from the rest of the sensors, respectively. ) Buffer size of sensors vs. the bias: The probabilities of finding a bias-elimination set increases with increasing buffer size of the sensor memory. In Fig. 3, we depict the relation between the bias of the aggregationandthebuffersize.asitisshown,bothgreedyand can reduce or even eliminate the bias of the aggregation by increasing the memory size of sensors. In order to zoom in the performance of the greedy and in the figure, we do not depict the bias performance of the standing gossiping algorithm. The bias for standard random gossiping approach without memory is up to b = on average for both N = 2 and N = 3, respectively. With the same buffer size, result in larger bias in comparison to. An explanation for this is that the message which neighborsensors in N i receive from sensor log b Buffer size / Message Fig. 3: Buffer size versus bias, solid lines for N = 2, dashed lines for N = 3 v i in the greedy case contains the parameters aggregated from all sensorsamongv i N i. Therefore,morebufferisrequiredto find the bias-elimination set. Furthermore, it is shown that with more sensors in the network which results in more neighbor sensors in N i, a larger buffer size is required at each sensor to find the bias-elimination set. 2) Number of Communications in different strategies: In papers regarding consensus problems using random gossiping, the convergence speed of aggregation is determined by a factor which captures the bias between the aggregation output and the true average []. In this paper, we assume that there are no sensors leaving or new sensors joining the network throughout the aggregation. With the indicating header, each sensor has the knowledge about how many parameters it has already aggregated. When all sensors have indicating headers whose entries are all one, the gossiping is finished. Therefore, we measure the convergence speed as the number of total number of communications of messages of all sensors Fig. 4: Comparison of the numbers of communications required until the gossiping stops In Fig. 4, we compare the numbers of communications required until the gossiping stops in the network, i.e., the indicating headers for messages at all sensors are all ones. This is done for the cases using indicating headers for greedy
5 sensors (blue curves) and (red curves). For comparison, also the performance of the Standard random GossiPing (Standard GP) discussed in [5] is shown. The abscissa in Fig. 4 is the number of message communications that are performed in the network. The ordinate gives the probability that the aggregation has been finished for all sensors in the network. Significant improvements can be witnessed by using indicating header before sensors exchanging the messages. 3) The effect of the indicating headers: In previous simulations, the additional communications for sensors exchanging the indicating headers have been neglected under the assumption that the message length in bits is much larger than N. In this part of simulations, we demonstrate the effect to the number of communications when the transmissions of the indicating-header are considered. We denote by η the ratio between the bit length of indicating-header and the length of the messages, with the assumption that all aggregations will result in the same message length in bits []. By adding the number of communications for exchanging the indicating headers times η to the number of communications for exchanging the messages, we can include the effect of indicating headers into our results η Fig. 5: Effect of indicating headers with. From left to right, η = %,5%,%,5%,2%,25%,3% In Fig. 5, we demonstrate the effect of indicating headers with different η when sensors are humble. Similar results can be seen in Fig. 6 when sensors are greedy. Both figures show that the gain in reducing the number of communications when considering the effect of indicating header can still be obtained even with larger η. Furthermore, the greedy sensor strategy is more efficient in terms of aggregation due to its faster spreading of messages within v i N i for every v i. VI. CONCLUSION In this paper, we considered the scenario where sensors in a wireless sensor network are aggregating messages from all other sensors using gossiping. We discussed how the concept of divisible functions can reduce the bias of the aggregation. Furthermore, we enable sensors to use messages in the memory to eliminate the bias. Two possible communication strategies have been investigated, greedy and humble. We introduced the concept of indicating header with which faster aggregation in the WSN can be achieved. Simulation results showed faster η Fig. 6: Effect of indicating headers with. From left to right, η = %,5%,%,5%,2%,25%,3% aggregation and significantly reduced bias in comparison to standard gossiping. REFERENCES [] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, A survey on sensor networks, IEEE Communications Magazine, vol. 4, no. 8, pp. 2 4, Aug. 22. [2] A. Giridhar and P. R. Kumar, Computing and communicating functions over sensor networks, IEEE Journal on Selected Areas in Communications, vol. 23, no. 4, pp , 25. [3], Toward a theory of in-network computation in wireless sensor networks, IEEE Communication Magazine, vol. 44, no. 4, pp. 98 7, 26. [4] R. Rajagopalan and P. K. Varshney, Data-aggregation techniques in sensor networks: A survey, IEEE Communications Survey and Tutorials, vol. 8, no. 4, pp , 26. [5] S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah, Randomized gossip algorithms, IEEE Transactions on Information Theory, vol. 52, no. 6, pp , 26. [6] P. Di Lorenzo, S. Barbarossa, and A. H. Sayed, Bio-inspired swarming for dynamic radio access based on diffusion adaptation, in Proc. 2th European Signal Processing Conference, 2. [7] T. C. Aysal, M. E. Yildiz, A. D. Sarwate, and A. Scaglione, Broadcast gossip algorithms for consensus, IEEE Transactions on Signal Processing, vol. 57, no. 7, pp , 29. [8] J. Choi, S. Li, X. Wang, and J. Ha, A general distributed consensus algorithm for wireless sensor networks, in 22 Wireless Advanced, 22. [9] S. Stanczak, M. Goldenbaum, R. Cavalcante, and F. Penna, On innetwork computation via wireless multiple-access channels with applications, in Proc. International Symposium on Wireless Communication Systems, 22. [] S. Sardellitti, S. Barbarossa, and A. Swami, Optimal topology control and power allocation for minimum energy consumption in consensus networks, IEEE Transactions on Signal Processing, vol. 6, no., pp , 22. [] Z. Chen, A. Kuehne, and A. Klein, Delay constraints for multiple applications in wireless sensor networks, in Proc. IEEE International Symposium on Wireless Communication Systems, 22.
BBS: Lian et An al. Energy Efficient Localized Routing Scheme. Scheme for Query Processing in Wireless Sensor Networks
International Journal of Distributed Sensor Networks, : 3 54, 006 Copyright Taylor & Francis Group, LLC ISSN: 1550-139 print/1550-1477 online DOI: 10.1080/1550130500330711 BBS: An Energy Efficient Localized
More informationChapter 2 Distributed Consensus Estimation of Wireless Sensor Networks
Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Recently, consensus based distributed estimation has attracted considerable attention from various fields to estimate deterministic
More informationDynamic Subcarrier, Bit and Power Allocation in OFDMA-Based Relay Networks
Dynamic Subcarrier, Bit and Power Allocation in OFDMA-Based Relay Networs Christian Müller*, Anja Klein*, Fran Wegner**, Martin Kuipers**, Bernhard Raaf** *Communications Engineering Lab, Technische Universität
More informationSense in Order: Channel Selection for Sensing in Cognitive Radio Networks
Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA 19122 Email: {ying.dai,
More informationON THE CONCEPT OF DISTRIBUTED DIGITAL SIGNAL PROCESSING IN WIRELESS SENSOR NETWORKS
ON THE CONCEPT OF DISTRIBUTED DIGITAL SIGNAL PROCESSING IN WIRELESS SENSOR NETWORKS Carla F. Chiasserini Dipartimento di Elettronica, Politecnico di Torino Torino, Italy Ramesh R. Rao California Institute
More informationDistributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes
7th Mediterranean Conference on Control & Automation Makedonia Palace, Thessaloniki, Greece June 4-6, 009 Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes Theofanis
More informationFeedback via Message Passing in Interference Channels
Feedback via Message Passing in Interference Channels (Invited Paper) Vaneet Aggarwal Department of ELE, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr Department of
More informationHow (Information Theoretically) Optimal Are Distributed Decisions?
How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr
More informationPerformance Analysis of Energy Consumption of AFECA in Wireless Sensor Networks
Proceedings of the World Congress on Engineering 2 Vol II WCE 2, July 6-8, 2, London, U.K. Performance Analysis of Energy Consumption of AFECA in Wireless Sensor Networks Yun Won Chung Abstract Energy
More informationModulated Backscattering Coverage in Wireless Passive Sensor Networks
Modulated Backscattering Coverage in Wireless Passive Sensor Networks Anusha Chitneni 1, Karunakar Pothuganti 1 Department of Electronics and Communication Engineering, Sree Indhu College of Engineering
More informationIN recent years, there has been great interest in the analysis
2890 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 7, JULY 2006 On the Power Efficiency of Sensory and Ad Hoc Wireless Networks Amir F. Dana, Student Member, IEEE, and Babak Hassibi Abstract We
More informationQ-Coverage Maximum Connected Set Cover (QC-MCSC) Heuristic for Connected Target Problem in Wireless Sensor Network
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 15 Issue 6 Version 1.0 Year 2015 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationPerformance comparison of AODV, DSDV and EE-DSDV routing protocol algorithm for wireless sensor network
Performance comparison of AODV, DSDV and EE-DSDV routing algorithm for wireless sensor network Mohd.Taufiq Norhizat a, Zulkifli Ishak, Mohd Suhaimi Sauti, Md Zaini Jamaludin a Wireless Sensor Network Group,
More informationA survey on broadcast protocols in multihop cognitive radio ad hoc network
A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels
More informationEXTENDED BLOCK NEIGHBOR DISCOVERY PROTOCOL FOR HETEROGENEOUS WIRELESS SENSOR NETWORK APPLICATIONS
31 st January 218. Vol.96. No 2 25 ongoing JATIT & LLS EXTENDED BLOCK NEIGHBOR DISCOVERY PROTOCOL FOR HETEROGENEOUS WIRELESS SENSOR NETWORK APPLICATIONS 1 WOOSIK LEE, 2* NAMGI KIM, 3 TEUK SEOB SONG, 4
More informationUtilization-Aware Adaptive Back-Pressure Traffic Signal Control
Utilization-Aware Adaptive Back-Pressure Traffic Signal Control Wanli Chang, Samarjit Chakraborty and Anuradha Annaswamy Abstract Back-pressure control of traffic signal, which computes the control phase
More informationOn Event Signal Reconstruction in Wireless Sensor Networks
On Event Signal Reconstruction in Wireless Sensor Networks Barış Atakan and Özgür B. Akan Next Generation Wireless Communications Laboratory Department of Electrical and Electronics Engineering Middle
More informationActive RFID System with Wireless Sensor Network for Power
38 Active RFID System with Wireless Sensor Network for Power Raed Abdulla 1 and Sathish Kumar Selvaperumal 2 1,2 School of Engineering, Asia Pacific University of Technology & Innovation, 57 Kuala Lumpur,
More informationExtending lifetime of sensor surveillance systems in data fusion model
IEEE WCNC 2011 - Network Exting lifetime of sensor surveillance systems in data fusion model Xiang Cao Xiaohua Jia Guihai Chen State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing,
More informationAn approach for solving target coverage problem in wireless sensor network
An approach for solving target coverage problem in wireless sensor network CHINMOY BHARADWAJ KIIT University, Bhubaneswar, India E mail: chinmoybharadwajcool@gmail.com DR. SANTOSH KUMAR SWAIN KIIT University,
More informationPerformance study of node placement in sensor networks
Performance study of node placement in sensor networks Mika ISHIZUKA and Masaki AIDA NTT Information Sharing Platform Labs, NTT Corporation 3-9-, Midori-Cho Musashino-Shi Tokyo 8-8585 Japan {ishizuka.mika,
More informationEfficient Resource Allocation in Mobile-edge Computation Offloading: Completion Time Minimization
Hong Quy Le, Hussein Al-Shatri, Anja Klein, Efficient Resource Allocation in Mobile-edge Computation Offloading: Completion ime Minimization, in Proc. IEEE International Symposium on Information heory
More informationNode Deployment Strategies and Coverage Prediction in 3D Wireless Sensor Network with Scheduling
Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 8 (2017) pp. 2243-2255 Research India Publications http://www.ripublication.com Node Deployment Strategies and Coverage
More informationIntroduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1
ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS Xiang Ji and Hongyuan Zha Material taken from Sensor Network Operations by Shashi Phoa, Thomas La Porta and Christopher Griffin, John Wiley,
More informationTIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS
TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS A Thesis by Masaaki Takahashi Bachelor of Science, Wichita State University, 28 Submitted to the Department of Electrical Engineering
More informationAn Improved MAC Model for Critical Applications in Wireless Sensor Networks
An Improved MAC Model for Critical Applications in Wireless Sensor Networks Gayatri Sakya Vidushi Sharma Trisha Sawhney JSSATE, Noida GBU, Greater Noida JSSATE, Noida, ABSTRACT The wireless sensor networks
More informationFault-tolerant Coverage in Dense Wireless Sensor Networks
Fault-tolerant Coverage in Dense Wireless Sensor Networks Akshaye Dhawan and Magdalena Parks Department of Mathematics and Computer Science, Ursinus College, 610 E Main Street, Collegeville, PA, USA {adhawan,
More informationCommunication Networks Group
Communication Networks Group Max Mustermann Eine Architektur zur Bestimmung der dynamischen Resonanzstärke von Rotkehlchen Bachelor Thesis in Elektrotechnik und Informationstechnik 26 May 2016 Please cite
More informationBottleneck Zone Analysis in WSN Using Low Duty Cycle in Wireless Micro Sensor Network
Bottleneck Zone Analysis in WSN Using Low Duty Cycle in Wireless Micro Sensor Network 16 1 Punam Dhawad, 2 Hemlata Dakhore 1 Department of Computer Science and Engineering, G.H. Raisoni Institute of Engineering
More informationRelay Placement in Sensor Networks
Relay Placement in Sensor Networks Jukka Suomela 14 October 2005 Contents: Wireless Sensor Networks? Relay Placement? Problem Classes Computational Complexity Approximation Algorithms HIIT BRU, Adaptive
More informationDesign of Parallel Algorithms. Communication Algorithms
+ Design of Parallel Algorithms Communication Algorithms + Topic Overview n One-to-All Broadcast and All-to-One Reduction n All-to-All Broadcast and Reduction n All-Reduce and Prefix-Sum Operations n Scatter
More informationAn Optimal (d 1)-Fault-Tolerant All-to-All Broadcasting Scheme for d-dimensional Hypercubes
An Optimal (d 1)-Fault-Tolerant All-to-All Broadcasting Scheme for d-dimensional Hypercubes Siu-Cheung Chau Dept. of Physics and Computing, Wilfrid Laurier University, Waterloo, Ontario, Canada, N2L 3C5
More informationOn Coding for Cooperative Data Exchange
On Coding for Cooperative Data Exchange Salim El Rouayheb Texas A&M University Email: rouayheb@tamu.edu Alex Sprintson Texas A&M University Email: spalex@tamu.edu Parastoo Sadeghi Australian National University
More informationReduced Overhead Distributed Consensus-Based Estimation Algorithm
Reduced Overhead Distributed Consensus-Based Estimation Algorithm Ban-Sok Shin, Henning Paul, Dirk Wübben and Armin Dekorsy Department of Communications Engineering University of Bremen Bremen, Germany
More informationBroadcast with Heterogeneous Node Capability
Broadcast with Heterogeneous Node Capability Intae Kang and Radha Poovendran Department of Electrical Engineering, University of Washington, Seattle, WA. email: {kangit,radha}@ee.washington.edu Abstract
More informationComputing functions over wireless networks
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License. Based on a work at decision.csl.illinois.edu See last page and http://creativecommons.org/licenses/by-nc-nd/3.0/
More informationDistributed Power Control in Cellular and Wireless Networks - A Comparative Study
Distributed Power Control in Cellular and Wireless Networks - A Comparative Study Vijay Raman, ECE, UIUC 1 Why power control? Interference in communication systems restrains system capacity In cellular
More informationA ROBUST SCHEME TO TRACK MOVING TARGETS IN SENSOR NETS USING AMORPHOUS CLUSTERING AND KALMAN FILTERING
A ROBUST SCHEME TO TRACK MOVING TARGETS IN SENSOR NETS USING AMORPHOUS CLUSTERING AND KALMAN FILTERING Gaurang Mokashi, Hong Huang, Bharath Kuppireddy, and Subin Varghese Klipsch School of Electrical and
More informationChapter Number. Parameter Estimation Over Noisy Communication Channels in Distributed Sensor Networks
Chapter Number Parameter Estimation Over Noisy Communication Channels in Distributed Sensor Networks Thakshila Wimalajeewa 1, Sudharman K. Jayaweera 1 and Carlos Mosquera 2 1 Dept. of Electrical and Computer
More informationMobility Tolerant Broadcast in Mobile Ad Hoc Networks
Mobility Tolerant Broadcast in Mobile Ad Hoc Networks Pradip K Srimani 1 and Bhabani P Sinha 2 1 Department of Computer Science, Clemson University, Clemson, SC 29634 0974 2 Electronics Unit, Indian Statistical
More informationA Greedy Algorithm for Target Coverage Scheduling in Directional Sensor Networks
A Greedy Algorithm for Target Coverage Scheduling in Directional Sensor Networks Youn-Hee Han, Chan-Myung Kim Laboratory of Intelligent Networks Advanced Technology Research Center Korea University of
More informationEnergy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks
Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Yuqun Zhang, Chen-Hsiang Feng, Ilker Demirkol, Wendi B. Heinzelman Department of Electrical and Computer
More informationp-percent Coverage in Wireless Sensor Networks
p-percent Coverage in Wireless Sensor Networks Yiwei Wu, Chunyu Ai, Shan Gao and Yingshu Li Department of Computer Science Georgia State University October 28, 2008 1 Introduction 2 p-percent Coverage
More informationMobile Base Stations Placement and Energy Aware Routing in Wireless Sensor Networks
Mobile Base Stations Placement and Energy Aware Routing in Wireless Sensor Networks A. P. Azad and A. Chockalingam Department of ECE, Indian Institute of Science, Bangalore 5612, India Abstract Increasing
More informationStudent Department of EEE (M.E-PED), 2 Assitant Professor of EEE Selvam College of Technology Namakkal, India
Design and Development of Single Phase Bridgeless Three Stage Interleaved Boost Converter with Fuzzy Logic Control System M.Pradeep kumar 1, M.Ramesh kannan 2 1 Student Department of EEE (M.E-PED), 2 Assitant
More informationCENTRALIZED BUFFERING AND LOOKAHEAD WAVELENGTH CONVERSION IN MULTISTAGE INTERCONNECTION NETWORKS
CENTRALIZED BUFFERING AND LOOKAHEAD WAVELENGTH CONVERSION IN MULTISTAGE INTERCONNECTION NETWORKS Mohammed Amer Arafah, Nasir Hussain, Victor O. K. Li, Department of Computer Engineering, College of Computer
More informationWE consider a wireless sensor network (WSN) where
IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 8, AUGUST 2011 3863 On Energy for Progressive and Consensus Estimation in Multihop Sensor Networks Yi Huang and Yingbo Hua, Fellow, IEEE Abstract This
More informationSupervisory Control for Cost-Effective Redistribution of Robotic Swarms
Supervisory Control for Cost-Effective Redistribution of Robotic Swarms Ruikun Luo Department of Mechaincal Engineering College of Engineering Carnegie Mellon University Pittsburgh, Pennsylvania 11 Email:
More informationOptimization Techniques for Alphabet-Constrained Signal Design
Optimization Techniques for Alphabet-Constrained Signal Design Mojtaba Soltanalian Department of Electrical Engineering California Institute of Technology Stanford EE- ISL Mar. 2015 Optimization Techniques
More informationCollaborative transmission in wireless sensor networks
Collaborative transmission in wireless sensor networks Cooperative transmission schemes Stephan Sigg Distributed and Ubiquitous Systems Technische Universität Braunschweig November 22, 2010 Stephan Sigg
More informationOptimal Multicast Routing in Ad Hoc Networks
Mat-2.108 Independent esearch Projects in Applied Mathematics Optimal Multicast outing in Ad Hoc Networks Juha Leino 47032J Juha.Leino@hut.fi 1st December 2002 Contents 1 Introduction 2 2 Optimal Multicasting
More informationLoad Balancing for Centralized Wireless Networks
Load Balancing for Centralized Wireless Networks Hong Bong Kim and Adam Wolisz Telecommunication Networks Group Technische Universität Berlin Sekr FT5 Einsteinufer 5 0587 Berlin Germany Email: {hbkim,
More informationCalculation on Coverage & connectivity of random deployed wireless sensor network factors using heterogeneous node
Calculation on Coverage & connectivity of random deployed wireless sensor network factors using heterogeneous node Shikha Nema*, Branch CTA Ganga Ganga College of Technology, Jabalpur (M.P) ABSTRACT A
More informationLow-Latency Multi-Source Broadcast in Radio Networks
Low-Latency Multi-Source Broadcast in Radio Networks Scott C.-H. Huang City University of Hong Kong Hsiao-Chun Wu Louisiana State University and S. S. Iyengar Louisiana State University In recent years
More informationLab S-3: Beamforming with Phasors. N r k. is the time shift applied to r k
DSP First, 2e Signal Processing First Lab S-3: Beamforming with Phasors Pre-Lab: Read the Pre-Lab and do all the exercises in the Pre-Lab section prior to attending lab. Verification: The Exercise section
More informationEncoding of Control Information and Data for Downlink Broadcast of Short Packets
Encoding of Control Information and Data for Downlin Broadcast of Short Pacets Kasper Fløe Trillingsgaard and Petar Popovsi Department of Electronic Systems, Aalborg University 9220 Aalborg, Denmar Abstract
More informationAn Energy Efficient Multi-Target Tracking in Wireless Sensor Networks Based on Polygon Tracking Method
International Journal of Emerging Trends in Science and Technology DOI: http://dx.doi.org/10.18535/ijetst/v2i8.03 An Energy Efficient Multi-Target Tracking in Wireless Sensor Networks Based on Polygon
More informationRouting versus Network Coding in Erasure Networks with Broadcast and Interference Constraints
Routing versus Network Coding in Erasure Networks with Broadcast and Interference Constraints Brian Smith Department of ECE University of Texas at Austin Austin, TX 7872 bsmith@ece.utexas.edu Piyush Gupta
More informationMOBILE COMPUTING NIT Agartala, Dept of CSE Jan-May,2012
Location Management for Mobile Cellular Systems MOBILE COMPUTING NIT Agartala, Dept of CSE Jan-May,2012 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com Cellular System
More informationImproved MDS-based Algorithm for Nodes Localization in Wireless Sensor Networks
Improved MDS-based Algorithm for Nodes Localization in Wireless Sensor Networks Biljana Risteska Stojkoska, Vesna Kirandziska Faculty of Computer Science and Engineering University "Ss. Cyril and Methodius"
More informationENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationRobust Key Establishment in Sensor Networks
Robust Key Establishment in Sensor Networks Yongge Wang Abstract Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research
More informationA Forwarding Station Integrated the Low Energy Adaptive Clustering Hierarchy in Ad-hoc Wireless Sensor Networks
A Forwarding Station Integrated the Low Energy Adaptive Clustering Hierarchy in Ad-hoc Wireless Sensor Networks Chao-Shui Lin, Ching-Mu Chen, Tung-Jung Chan and Tsair-Rong Chen Department of Electrical
More informationScalable Routing Protocols for Mobile Ad Hoc Networks
Helsinki University of Technology T-79.300 Postgraduate Course in Theoretical Computer Science Scalable Routing Protocols for Mobile Ad Hoc Networks Hafeth Hourani hafeth.hourani@nokia.com Contents Overview
More informationMonitoring Churn in Wireless Networks
Monitoring Churn in Wireless Networks Stephan Holzer 1 Yvonne-Anne Pignolet 2 Jasmin Smula 1 Roger Wattenhofer 1 {stholzer, smulaj, wattenhofer}@tik.ee.ethz.ch, yvonne-anne.pignolet@ch.abb.com 1 Computer
More informationRumors Across Radio, Wireless, and Telephone
Rumors Across Radio, Wireless, and Telephone Jennifer Iglesias Carnegie Mellon University Pittsburgh, USA jiglesia@andrew.cmu.edu R. Ravi Carnegie Mellon University Pittsburgh, USA ravi@andrew.cmu.edu
More informationAn Optimized Wallace Tree Multiplier using Parallel Prefix Han-Carlson Adder for DSP Processors
An Optimized Wallace Tree Multiplier using Parallel Prefix Han-Carlson Adder for DSP Processors T.N.Priyatharshne Prof. L. Raja, M.E, (Ph.D) A. Vinodhini ME VLSI DESIGN Professor, ECE DEPT ME VLSI DESIGN
More informationLink State Routing. Brad Karp UCL Computer Science. CS 3035/GZ01 3 rd December 2013
Link State Routing Brad Karp UCL Computer Science CS 33/GZ 3 rd December 3 Outline Link State Approach to Routing Finding Links: Hello Protocol Building a Map: Flooding Protocol Healing after Partitions:
More informationFOUR TOTAL TRANSFER CAPABILITY. 4.1 Total transfer capability CHAPTER
CHAPTER FOUR TOTAL TRANSFER CAPABILITY R structuring of power system aims at involving the private power producers in the system to supply power. The restructured electric power industry is characterized
More informationDownlink Erlang Capacity of Cellular OFDMA
Downlink Erlang Capacity of Cellular OFDMA Gauri Joshi, Harshad Maral, Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology Bombay Powai, Mumbai, India 400076. Email: gaurijoshi@iitb.ac.in,
More informationLuca Schenato joint work with: A. Basso, G. Gamba
Distributed consensus protocols for clock synchronization in sensor networks Luca Schenato joint work with: A. Basso, G. Gamba Networked Control Systems Drive-by-wire systems Swarm robotics Smart structures:
More informationEnergy Reduction of Ultra-Low Voltage VLSI Circuits by Digit-Serial Architectures
Energy Reduction of Ultra-Low Voltage VLSI Circuits by Digit-Serial Architectures Muhammad Umar Karim Khan Smart Sensor Architecture Lab, KAIST Daejeon, South Korea umar@kaist.ac.kr Chong Min Kyung Smart
More informationAn Improved DV-Hop Localization Algorithm Based on Hop Distance and Hops Correction
, pp.319-328 http://dx.doi.org/10.14257/ijmue.2016.11.6.28 An Improved DV-Hop Localization Algorithm Based on Hop Distance and Hops Correction Xiaoying Yang* and Wanli Zhang College of Information Engineering,
More informationSelf-triggered Control of Multiple Loops over IEEE Networks
Proceedings of the 8th World Congress The International Federation of Automatic Control Milano (Italy) August 28 - September 2, 2 Self-triggered Control of Multiple Loops over IEEE 82.5.4 Networks U. Tiberi
More informationThe Capability of Error Correction for Burst-noise Channels Using Error Estimating Code
The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code Yaoyu Wang Nanjing University yaoyu.wang.nju@gmail.com June 10, 2016 Yaoyu Wang (NJU) Error correction with EEC June
More informationInterference-Aware Joint Routing and TDMA Link Scheduling for Static Wireless Networks
Interference-Aware Joint Routing and TDMA Link Scheduling for Static Wireless Networks Yu Wang Weizhao Wang Xiang-Yang Li Wen-Zhan Song Abstract We study efficient interference-aware joint routing and
More informationMulti-Band Spectrum Allocation Algorithm Based on First-Price Sealed Auction
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 1 Sofia 2017 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2017-0008 Multi-Band Spectrum Allocation
More informationHierarchical Agglomerative Aggregation Scheduling in Directional Wireless Sensor Networks
Hierarchical Agglomerative Aggregation Scheduling in Directional Wireless Sensor Networks Min Kyung An Department of Computer Science Sam Houston State University Huntsville, Texas 77341, USA Email: an@shsu.edu
More informationAn Enhanced DAP-NAD Scheme for Multi-hop Broadcast based on MIL-STD Networks
An Enhanced DAP-NAD Scheme for Multi-hop Broadcast based on MIL-STD-188-220 Networks Jong-yon Kim*, Busung Kim*, Byeong-hee Roh** * Mobile Multimedia Communication Network Lab., Ajou Univ., Suwon, South
More informationConnected Identifying Codes
Connected Identifying Codes Niloofar Fazlollahi, David Starobinski and Ari Trachtenberg Dept. of Electrical and Computer Engineering Boston University, Boston, MA 02215 Email: {nfazl,staro,trachten}@bu.edu
More informationComposite Event Detection in Wireless Sensor Networks
Composite Event Detection in Wireless Sensor Networks Chinh T. Vu, Raheem A. Beyah and Yingshu Li Department of Computer Science, Georgia State University Atlanta, Georgia 30303 {chinhvtr, rbeyah, yli}@cs.gsu.edu
More informationSENSOR PLACEMENT FOR MAXIMIZING LIFETIME PER UNIT COST IN WIRELESS SENSOR NETWORKS
SENSOR PACEMENT FOR MAXIMIZING IFETIME PER UNIT COST IN WIREESS SENSOR NETWORKS Yunxia Chen, Chen-Nee Chuah, and Qing Zhao Department of Electrical and Computer Engineering University of California, Davis,
More informationChannel Assignment with Route Discovery (CARD) using Cognitive Radio in Multi-channel Multi-radio Wireless Mesh Networks
Channel Assignment with Route Discovery (CARD) using Cognitive Radio in Multi-channel Multi-radio Wireless Mesh Networks Chittabrata Ghosh and Dharma P. Agrawal OBR Center for Distributed and Mobile Computing
More informationWireless Network Coding with Local Network Views: Coded Layer Scheduling
Wireless Network Coding with Local Network Views: Coded Layer Scheduling Alireza Vahid, Vaneet Aggarwal, A. Salman Avestimehr, and Ashutosh Sabharwal arxiv:06.574v3 [cs.it] 4 Apr 07 Abstract One of the
More informationUtilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks
Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Shih-Hsien Yang, Hung-Wei Tseng, Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,
More informationLink State Routing. Stefano Vissicchio UCL Computer Science CS 3035/GZ01
Link State Routing Stefano Vissicchio UCL Computer Science CS 335/GZ Reminder: Intra-domain Routing Problem Shortest paths problem: What path between two vertices offers minimal sum of edge weights? Classic
More informationEnergy Efficiency using Data Filtering Approach on Agricultural Wireless Sensor Network
International Journal of Computer Engineering and Information Technology VOL. 9, NO. 9, September 2017, 192 197 Available online at: www.ijceit.org E-ISSN 2412-8856 (Online) Energy Efficiency using Data
More informationEasyChair Preprint. A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network
EasyChair Preprint 78 A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network Yuzhou Liu and Wuwen Lai EasyChair preprints are intended for rapid dissemination of research results and
More informationInternet of Things Cognitive Radio Technologies
Internet of Things Cognitive Radio Technologies Torino, 29 aprile 2010 Roberto GARELLO, Politecnico di Torino, Italy Speaker: Roberto GARELLO, Ph.D. Associate Professor in Communication Engineering Dipartimento
More informationAn Energy Efficient Localization Strategy using Particle Swarm Optimization in Wireless Sensor Networks
An Energy Efficient Localization Strategy using Particle Swarm Optimization in Wireless Sensor Networks Ms. Prerana Shrivastava *, Dr. S.B Pokle **, Dr.S.S.Dorle*** * Research Scholar, Electronics Department,
More informationAdvances in Radio Science
Advances in Radio Science (23) 1: 149 153 c Copernicus GmbH 23 Advances in Radio Science Downlink beamforming concepts in UTRA FDD M. Schacht 1, A. Dekorsy 1, and P. Jung 2 1 Lucent Technologies, Thurn-und-Taxis-Strasse
More informationENERGY EFFICIENT DATA COMMUNICATION SYSTEM FOR WIRELESS SENSOR NETWORK USING BINARY TO GRAY CONVERSION
ENERGY EFFICIENT DATA COMMUNICATION SYSTEM FOR WIRELESS SENSOR NETWORK USING BINARY TO GRAY CONVERSION S.B. Jadhav 1, Prof. R.R. Bhambare 2 1,2 Electronics and Telecommunication Department, SVIT Chincholi,
More informationResearch Article An Efficient Algorithm for Energy Management in Wireless Sensor Networks via Employing Multiple Mobile Sinks
Hindawi Publishing Corporation International Journal of Distributed Sensor Networks Volume 216, Article ID 3179587, 9 pages http://dx.doi.org/1.1155/216/3179587 Research Article An Efficient Algorithm
More informationTarget Coverage in Wireless Sensor Networks with Probabilistic Sensors
Article Target Coverage in Wireless Sensor Networks with Probabilistic Sensors Anxing Shan 1, Xianghua Xu 1, * and Zongmao Cheng 2 1 School of Computer Science, Hangzhou Dianzi University, Hangzhou 310018,
More informationPerformance Analysis of Different Localization Schemes in Wireless Sensor Networks Sanju Choudhary 1, Deepak Sethi 2 and P. P.
Performance Analysis of Different Localization Schemes in Wireless Sensor Networks Sanju Choudhary 1, Deepak Sethi 2 and P. P. Bhattacharya 3 Abstract: Wireless Sensor Networks have attracted worldwide
More informationCooperative Wireless Networking Using Software Defined Radio
Cooperative Wireless Networking Using Software Defined Radio Jesper M. Kristensen, Frank H.P Fitzek Departement of Communication Technology Aalborg University, Denmark Email: jmk,ff@kom.aau.dk Abstract
More informationOPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS
9th European Signal Processing Conference (EUSIPCO 0) Barcelona, Spain, August 9 - September, 0 OPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS Sachin Shetty, Kodzo Agbedanu,
More informationEnergy-Effective Communication Based on Compressed Sensing
American Journal of etworks and Communications 2016; 5(6): 121-127 http://www.sciencepublishinggroup.com//anc doi: 10.11648/.anc.20160506.11 ISS: 2326-893X (Print); ISS: 2326-8964 (Online) Energy-Effective
More informationSets. Definition A set is an unordered collection of objects called elements or members of the set.
Sets Definition A set is an unordered collection of objects called elements or members of the set. Sets Definition A set is an unordered collection of objects called elements or members of the set. Examples:
More informationA Closed Form for False Location Injection under Time Difference of Arrival
A Closed Form for False Location Injection under Time Difference of Arrival Lauren M. Huie Mark L. Fowler lauren.huie@rl.af.mil mfowler@binghamton.edu Air Force Research Laboratory, Rome, N Department
More information